Page 277 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 277
Quantum-Resistant Cryptography: The Perfect Partner
ZTA is powerful, but it is not the only solution. To respond fully to quantum threats, we need quantum-
resistant cryptography – the algorithms intended for use against quantum attacks. The National Institute
of Standards and Technology (NIST) is the leading body in standardizing options like these:
• Lattice-Based Cryptography: The cryptography based on complex lattice mathematics.
CRYSTALS – Kyber (NIST selected) is one of them.
• Hash-Based Cryptography: Cryptography based on quantum-proof hash functions. SPHINCS+
is excellent.
• Code Based Cryptography: The security of this system is based on error correcting codes. As
an example, McEliece has proved its effectiveness.
• Multivariate Cryptography: It solves complex equations. Rainbow is a notable scheme.
• Isogeny-Based Cryptography: It uses secure key exchange using elliptic curve isogenies.
These combined with ZTA provide a layered defense. Picture a cybersecurity onion: peel one layer, and
another stands strong.
Fig. 3: Five Pillars of Quantum-Resistant Cryptography
277